2.6
CVSSv2

CVE-2007-5274

Published: 08/10/2007 Updated: 30/10/2018
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and previous versions, JDK and JRE 5.0 Update 12 and previous versions, SDK and JRE 1.4.2_15 and previous versions, and SDK and JRE 1.3.1_20 and previous versions, when Firefox or Opera is used, allows remote malicious users to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273. NOTE: this is similar to CVE-2007-5232.

Vulnerable Product Search on Vulmon Subscribe to Product

sun jdk

sun jdk 1.5.0

sun jdk 1.6.0

sun jdk 6

sun jre

sun jre 1.3.0

sun jre 1.3.1

sun jre 1.4

sun jre 1.4.1

sun jre 1.4.2

sun jre 1.4.2 1

sun jre 1.4.2 3

sun jre 1.4.2 8

sun jre 1.4.2 9

sun jre 1.4.2 10

sun jre 1.4.2 11

sun jre 1.4.2 12

sun jre 1.4.2 13

sun jre 1.4.2 14

sun jre 1.5.0

sun jre 1.6.0

sun sdk

sun sdk 1.3.1 01

sun sdk 1.3.1 01a

sun sdk 1.3.1 16

sun sdk 1.3.1 18

sun sdk 1.3.1 19

sun sdk 1.4.2

sun sdk 1.4.2 03

sun sdk 1.4.2 08

sun sdk 1.4.2 09

sun sdk 1.4.2 10

sun sdk 1.4.2 11

sun sdk 1.4.2 12

sun sdk 1.4.2 13

sun sdk 1.4.2 14

sun sdk 1.4.2 15

References

NVD-CWE-Otherhttp://crypto.stanford.edu/dns/dns-rebinding.pdfhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-103078-1http://securitytracker.com/id?1018771http://support.novell.com/techcenter/psdb/0c36b6416afc3868b8b1b9012955e323.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0963.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1041.htmlhttp://www.novell.com/linux/security/advisories/2007_55_java.htmlhttp://www.securityfocus.com/bid/25918http://secunia.com/advisories/27206http://secunia.com/advisories/27261http://secunia.com/advisories/27716http://secunia.com/advisories/27693http://secunia.com/advisories/27804http://secunia.com/advisories/28777http://dev2dev.bea.com/pub/advisory/272http://www.redhat.com/support/errata/RHSA-2008-0132.htmlhttp://secunia.com/advisories/28880http://secunia.com/advisories/29042http://sunsolve.sun.com/search/document.do?assetkey=1-66-200041-1http://www.gentoo.org/security/en/glsa/glsa-200804-20.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00010.htmlhttp://secunia.com/advisories/29858http://security.gentoo.org/glsa/glsa-200804-28.xmlhttp://secunia.com/advisories/29897http://secunia.com/advisories/30780http://secunia.com/advisories/30676http://www.vmware.com/security/advisories/VMSA-2008-0010.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200806-11.xmlhttp://www.vupen.com/english/advisories/2008/0609http://www.vupen.com/english/advisories/2008/1856/referenceshttp://www.vupen.com/english/advisories/2007/3895http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01234533https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10908http://www.securityfocus.com/archive/1/482926/100/0/threadedhttps://nvd.nist.gov